Description
A vulnerability was identified in EasyCMS up to 1.6. The affected element is an unknown function of the file /RbacnodeAction.class.php of the component Request Parameter Handler. The manipulation of the argument _order leads to sql injection. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection that can compromise database confidentiality and integrity
Action: Patch
AI Analysis

Impact

The flaw is present in EasyCMS versions up to 1.6 and is triggered by manipulating the _order argument in the RbacnodeAction.class.php component. The injection allows an attacker to execute arbitrary SQL statements against the backend database, potentially leading to data theft, data modification or unauthorized access to administrative credentials. This directly undermines both the confidentiality and integrity of the data stored by the application.

Affected Systems

Any installation of EasyCMS running version 1.6 or earlier is susceptible. No vendor‑specific patch is currently available because the vendor did not respond to the disclosure. All affected instances rely on the default parameter handling for _order.

Risk and Exploitability

The CVSS base score of 5.3 indicates moderate risk, and the EPSS score of less than 1% suggests a low likelihood of exploitation at present. The vulnerability is remote and publicly documented on several sites, which could increase future exploitation attempts. Because the exploit path does not require authentication and can be activated over the network, the risk to the database is significant if the system is exposed to the internet.

Generated by OpenCVE AI on April 16, 2026 at 04:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade EasyCMS to a version that removes the unfiltered _order parameter or applies a patch once available
  • If upgrading is not an option, add explicit validation on the _order input to allow only predetermined safe values such as a numeric identifier
  • Restrict remote access to the administrative interface by configuring firewall rules or IP whitelisting to limit exposure
  • Regularly review database and application logs for unusual query patterns or failed authentication attempts

Generated by OpenCVE AI on April 16, 2026 at 04:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 08 Mar 2026 22:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in EasyCMS up to 1.6. The affected element is an unknown function of the file /RbacnodeAction.class.php of the component Request Parameter Handler. The manipulation of the argument _order leads to sql injection. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title EasyCMS Request Parameter RbacnodeAction.class.php sql injection
First Time appeared Easycms
Easycms easycms
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:easycms:easycms:*:*:*:*:*:*:*:*
Vendors & Products Easycms
Easycms easycms
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-10T20:37:00.212Z

Reserved: 2026-03-08T07:03:26.699Z

Link: CVE-2026-3785

cve-icon Vulnrichment

Updated: 2026-03-10T20:36:56.617Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-08T23:15:50.207

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3785

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T04:15:24Z

Weaknesses